Unless you're selling this to the NSA/GCHQ, clean /all is fine.
It is more indepth than clean, but not nearly as indepth as a Secure Erase from the manufacturer.
Clean removes the partition info.
Clean all, in theory, rewrites the data back to zero. But the way SSD's work is different than HDD's. Technically, the info is still there sort of, but can't be retrieved by normal consumer use.
I see. Thank you. I don't see secure erase on the Crucial website. And I downloaded Parted Magic, but my M500 SSD didn't show up on the list of drives for running secure erase.Unless you're selling this to the NSA/GCHQ, clean /all is fine.
It is more indepth than clean, but not nearly as indepth as a Secure Erase from the manufacturer.
Clean removes the partition info.
Clean all, in theory, rewrites the data back to zero. But the way SSD's work is different than HDD's. Technically, the info is still there sort of, but can't be retrieved by normal consumer use.
Thank you for the reply. I downloaded/ran Crystal Disk Info, but can find nothing in the menus pertaing to dumping device data. But then, I'm kinda stupid.Many SSDs transparently encrypt your data. These can be cryptographically erased in a matter seconds by throwing away the encryption key.
The ATA Secure Erase command runs internally within the HDD, with no traffic over the SATA interface. It writes a predefined data pattern to all sectors in the user area. The Enhanced Secure Erase command also overwrites any bad sectors (in the grown defect list).
You can determine whether Secure Erase is supported by dumping the Identify Device data with a tool such as CrystalDiskInfo.
https://crystalmark.info/en/software/crystaldiskinfo/
If you can provide this info, I will be able to check this for you.